scholarly journals SLA amongst Users and Providers in Multi-Cloud Environment Through Negotiation Model

Author(s):  
Merita Kasa Halili ◽  
Betim Cico

<p class="0abstract">Cloud Computing conducts application, infrastructure services or platform to a very large amount of users with more choices and continuous changing requirements. Cloud providers are occupied in organizing data warehouses to arrange the continuous growth in cloud user’s acceptance. Features of cloud computing services have afforded an important tendency of companies choosing these services. In this case, many cloud users, who intend a certain service, and many cloud providers, who provision those services, create a competitive market. When constructing a Cloud scheduling scheme, the project trade-offs of the Cloud architecture should be rated. The simplest manner to rate this infrastructure is to use a simulation tool called CloudSim simulation toolkit. To reduce/avoid SLA violations in the cloud computing system, in our work we propose a SLA reduction framework in which we have considered three steps: Migration control of VMs, Energy efficiency and VmScheduling. It is also implemented in Cloudsimulator.</p>

Author(s):  
Surahmat Surahmat ◽  
Alfred Tenggono

Cloud computing is a technology that utilizes the internet as a service so that it does not use too many physical computers because the cloud computing system uses a virtual system where by using a computer alone it can provide services to many computers at the same time with a virtualization system. Research conducted by researchers focuses on comparing the performance of Infrastructure as a Service Cloud Computing services with the aim to finding out the strengths and weaknesses of the two types of software with type 1 hypervisor technology, namely Proxmox and Xenserver. The method used in this study is to use action research. The testing scheme conducted in this study is testing CPU load and memory usage, benchmark testing, network traffic testing, and retrieval of service user responsses. The results of testing on Xenserver and Proxmox get good responsse results for CPU load and memory usage testing, benchmark testing, network traffic testing then for responsse results from users Proxmox get a total value of 3848 and Xenserver 3739.


2016 ◽  
pp. 709-734
Author(s):  
Konstantinos Koumaditis ◽  
George Pittas ◽  
Marinos Themistocleous ◽  
George Vassilacopoulos ◽  
Andriana Prentza ◽  
...  

Healthcare organisations are forced to reconsider their current business practices and embark on a cloud adoption journey. Cloud-Computing offers important benefits that make it attractive for healthcare (e.g. cost effective model, big data management etc.). Large Information Technology (IT) companies are investing big sums in building infrastructure, services, tools and applications to facilitate Cloud-Computing for healthcare organisations, practitioners and patients. Yet, many challenges that such integration projects contain are still in the e-health research agenda like design and technology requirements to handle big volume of data, ensure scalability and user satisfaction to name a few. The purpose of this chapter is (a) to address the Cloud-Computing services for healthcare in the form of a Personal Healthcare record (PHR) and (b) demonstrate a multidisciplinary project. In doing so, the authors aim at increasing the awareness of this important endeavour and provide insights on Cloud-Computing e-health services for healthcare organisations.


2019 ◽  
Vol 8 (S1) ◽  
pp. 54-57
Author(s):  
V. Sulochana

This article proposed a graphical password authentication which uses chunks of images to overcome the loopholes present in the traditional authentication methods. The graphical password contains a selection of chunks of images which creates password for authenticating cloud users for accessing cloud services. The article includes the details of chunks of images authentication, algorithm and implementation of chunk of images.


2020 ◽  
pp. 1781-1790
Author(s):  
ABDUL RASHID DAR ◽  
D Ravindran ◽  
Shahidul Islam

The cloud-users are getting impatient by experiencing the delays in loading the content of the web applications over the internet, which is usually caused by the complex latency while accessing the cloud datacenters distant from the cloud-users. It is becoming a catastrophic situation in availing the services and applications over the cloud-centric network. In cloud, workload is distributed across the multiple layers which also increases the latency. Time-sensitive Internet of Things (IoT) applications and services, usually in a cloud platform, are running over various virtual machines (VM’s) and possess high complexities while interacting. They face difficulties in the consolidations of the various applications containing heterogenetic workloads. Fog computing takes the cloud computing services to the edge-network, where computation, communication and storage are within the proximity to the end-user’s edge devices. Thus, it utilizes the maximum network bandwidth, enriches the mobility, and lowers the latency. It is a futuristic, convenient and more reliable platform to overcome the cloud computing issues. In this manuscript, we propose a Fog-based Spider Web Algorithm (FSWA), a heuristic approach which reduces the delays time (DT) and enhances the response time (RT) during the workflow among the various edge nodes across the fog network. The main purpose is to trace and locate the nearest f-node for computation and to reduce the latency across the various nodes in a network. Reduction of latency will enhance the quality of service (QoS) parameters, smooth resource distribution, and services availability. Latency can be an important factor for resource optimization issues in distributed computing environments. In comparison to the cloud computing, the latency in fog computing is much improved.


Author(s):  
Konstantinos Koumaditis ◽  
George Pittas ◽  
Marinos Themistocleous ◽  
George Vassilacopoulos ◽  
Andriana Prentza ◽  
...  

Healthcare organisations are forced to reconsider their current business practices and embark on a cloud adoption journey. Cloud-Computing offers important benefits that make it attractive for healthcare (e.g. cost effective model, big data management etc.). Large Information Technology (IT) companies are investing big sums in building infrastructure, services, tools and applications to facilitate Cloud-Computing for healthcare organisations, practitioners and patients. Yet, many challenges that such integration projects contain are still in the e-health research agenda like design and technology requirements to handle big volume of data, ensure scalability and user satisfaction to name a few. The purpose of this chapter is (a) to address the Cloud-Computing services for healthcare in the form of a Personal Healthcare record (PHR) and (b) demonstrate a multidisciplinary project. In doing so, the authors aim at increasing the awareness of this important endeavour and provide insights on Cloud-Computing e-health services for healthcare organisations.


2018 ◽  
Vol 12 (6) ◽  
pp. 143 ◽  
Author(s):  
Osama Harfoushi ◽  
Ruba Obiedat

Cloud computing is the delivery of computing resources over the Internet. Examples include, among others, servers, storage, big data, databases, networking, software, and analytics. Institutes that provide cloud computing services are called providers. Cloud computing services were primarily developed to help IT professionals through application development, big data storage and recovery, website hosting, on-demand software delivery, and analysis of significant data patterns that could compromise a system’s security. Given the widespread availability of cloud computing, many companies have begun to implement the system because it is cost-efficient, reliable, scalable, and can be accessed from anywhere at any time. The most demanding feature of a cloud computing system is its security platform, which uses cryptographic algorithm levels to enhance protection of unauthorized access, modification, and denial of services. For the most part, cloud security uses algorithms to ensure the preservation of big data stored on remote servers. This study proposes a methodology to reduce concerns about data privacy by using cloud computing cryptography algorithms to improve the security of various platforms and to ensure customer satisfaction.


2014 ◽  
Vol 543-547 ◽  
pp. 3632-3635
Author(s):  
Hui Juan Xie ◽  
Wei She ◽  
Chang Hao Han

Cloud computing system preserves the security and privacy of a user's data by replicating data among several clouds and by using the secret sharing approach. It uses the database management system DBMS (data source) to manage and control the operations between the clients and them ulti-clouds inside a cloud service provider [1]. Generally speaking, The Shamir's threshold scheme is suitable for the shares in the cloud computing. The Shamir's threshold scheme as a secret sharing scheme will attract more attention in the cloud computing in future.


Author(s):  
P. S. Aithal ◽  
Vaikunth Pai T

An ideal computing system is a computing system with ideal characteristics. The major components and their performance characteristics of such hypothetical system can be studied as a model with predicted input, output, system and environmental characteristics using the identified objectives of computing which can be used in any platform, any type of computing system, and for application automation, without making modifications in the form of structure, hardware, and software coding by an external user. In this paper, we have proposed cloud computing service model to be used as a part of computing processor section enabled through information communication technology concept and discussed how it will support the computing processor part of ideal computing processor section by providing virtual system components with both hardware and software from the cloud to realize ideal computing system model. In this model, the infrastructure required for an ideal computing processor section is owned by a third party vendor and the cloud computing services are delivered to the ideal computing system over the Internet on a leased/wireless basis with the capability to extend up or down their service requirements or needs ubiquitously and almost infinite scale-up capability. A well designed flexible cloud computing system can work and fulfill the requirement of the processing section of an ideal computing device. It also offers an innovative business concept for organizations to adopt ideal computing services without advance investment and enables convenient, on-request network accessibility to a shared pool of IT computing resources like networks, servers, storage, applications, and services


2014 ◽  
Vol 3 ◽  
pp. 94-112
Author(s):  
Angelė Pečeliūnaitė

The article analyses the possibility of how Cloud Computing can be used by libraries to organise activities online. In order to achieve a uniform understanding of the essence of technology SaaS, IaaS, and PaaS, the article discusses the Cloud Computing services, which can be used for the relocation of libraries to the Internet. The improvement of the general activity of libraries in the digital age, the analysis of the international experience in the libraries are examples. Also the article discusses the results of a survey of the Lithuanian scientific community that confirms that 90% of the scientific community is in the interest of getting full access to e-publications online. It is concluded that the decrease in funding for libraries, Cloud Computing can be an economically beneficial step, expanding the library services and improving their quality.


Sign in / Sign up

Export Citation Format

Share Document